Connect with us

Cyber Security

Google Chrome Update Includes Critical Security Fixes

Avatar

Published

on

Reading Time: 1 minute

Critical Security Fixes
Google has released Chrome 37.0.2062.94 for Windows, Mac and Linux. This update includes 50 security fixes some of which could allow a remote attacker to obtain unauthorized access or cause a denial of service.

Users and administrators should review the Google Chrome release blog and apply the necessary updates.

In addition, the Google Chrome update moves it away from Microsoft’s Graphics Device Interface rendering method to Microsoft’s DirectWrite text rendering API. GDI is considered to render text in Chrome worse compared to other browsers, an issue that has been outstanding for several years.

Chrome 37 includes new APIs for apps, extensions and changes that Google claims will improve performance and stability. Significantly, Google is including 64 bit support for the first time.

Comodo offers its own free to download Chromium based browser, Comodo Dragon. It includes unique security and privacy enhancements not found in any other browser.

TEST YOUR EMAIL SECURITY GET YOUR INSTANT SECURITY SCORECARD FOR FREE Source: https://blog.comodo.com/pc-security/google-chrome-update/

AI

Resiliency And Security: Future-Proofing Our AI Future

Avatar

Published

on

Deploying AI in the enterprise means thinking forward for resiliency and security (GETTY IMAGES)

By Allison Proffitt, AI Trends

On the first day of the Second Annual AI World Government conference and expo held virtually October 28-30, a panel moderated by Robert Gourley, cofounder & CTO of OODA, raised the issue of AI resiliency. Future-proofing AI solutions requires keeping your eyes open to upcoming likely legal and regulatory roadblocks, said Antigone Peyton, General Counsel & Innovation Strategist at Cloudigy Law. She takes a “use as little as possible” approach to data, raising questions such as: How long do you really need to keep training data? Can you abstract training data to the population level, removing some risk while still keeping enough data to find dangerous biases?

Stephen Dennis, Director of Advanced Computing Technology Centers at the U.S. Department of Homeland Security, also recommended a forward-looking posture, but in terms of the AI workforce. In particular, Dennis challenged the audience to consider the maturity level of the users of new AI technology. Full automation is not likely a first AI step, he said. Instead, he recommends automating slowly, bringing the team along. Take them a technology that works in the context they are used to, he said. They shouldn’t need a lot of training. Mature your team with the technology. Remove the human from the loop slowly.

Of course, some things will never be fully automated. Brian Drake, U.S. Department of Defense, pointed out that some tasks are inherently human-to-human interactions—such as gathering human intelligence. But AI can help humans do even those tasks better, he said.

He also cautioned enterprises to consider their contingency plan as they automate certain tasks. For example, we rarely remember phone numbers anymore. We’ve outsourced that data to our phones while accepting a certain level of risk. If you deploy a tool that replaces a human analytic activity, that’s fine, Drake said. But be prepared with a contingency plan, a solution for failure.   

Organizing for Resiliency

All of these changes will certainly require some organizational rethinking, the panel agreed. While government is organized in a top down fashion, Dennis said, the most AI-forward companies—Uber, Netflix—organize around the data. That makes more sense, he proposed, if we are carefully using the data.

Data models—like the new car trope—begin degrading the first day they are used. Perhaps the source data becomes outdated. Maybe an edge use case was not fully considered. The deployment of the model itself may prompt a completely unanticipated behavior. We must capture and institutionalize those assessments, Dennis said. He proposed an AI quality control team—different from the team building and deploying algorithms—to understand degradation and evaluate the health of models in an ongoing way. His group is working on this with sister organizations in cyber security, and he hopes the best practices they develop can be shared to the rest of the department and across the government.

Peyton called for education—and reeducation—across organizations. She called the AI systems we use today a “living and breathing animal”. This is not, she emphasized, an enterprise-level system that you buy once and drop into the organization. AI systems require maintenance, and someone must be assigned to that caretaking.

But at least at the Department of Defense, Drake pointed out, all employees are not expected to become data scientists. We’re a knowledge organization, he said, but even if reskilling and retraining are offered, a federal workforce does not have to universally accept those opportunities. However, surveys across DoD have revealed an “appetite to learn and change”, Drake said. The Department is hoping to feed that curiosity with a three-tiered training program offering executive-level overviews, practitioner-level training on the tools currently in place, and formal data science training. He encouraged a similar structure to AI and data science training across other organizations.

Bad AI Actors

Gourley turned the conversation to bad actors. The very first telegraph message between Washington DC and Baltimore in 1844 was an historic achievement. The second and third messages—Gourley said—were spam and fraud. Cybercrime is not new and it is absolutely guaranteed in AI. What is the way forward, Gourley asked the panel.

“Our adversaries have been quite clear about their ambitions in this space,” Drake said. “The Chinese have published a national artificial intelligence strategy; the Russians have done the same thing. They are resourcing those plans and executing them.”

In response, Drake argued for the vital importance of ethics frameworks and for the United States to embrace and use these technologies in an “ethically up front and moral way.” He predicted a formal codification around AI ethics standards in the next couple of years similar to international nuclear weapons agreements now.

Source: https://www.aitrends.com/ai-world-government/deploying-ai-in-the-enterprise-means-thinking-forward-for-resiliency-and-security/

Continue Reading

Cyber Security

How the PS5 Will Completely Change Gaming As We Know It?

Avatar

Published

on

gamming

It’s fair to say that the PS5 isn’t exactly being released at the perfect time. While gaming is as big as it has ever been, the world is in a global pandemic and people are less secure about their finances than ever before.

So a new $500 console perhaps isn’t going to be at the top of everyone’s priorities. That said, it’s a device that could be a real gamechanger. Which is only a good thing for console gaming.

Table of Contents

Video Gaming Falling Behind Online & Mobile

In recent years, video gaming has fallen significantly behind the likes of mobile gaming, with the latter enjoying a huge book during the pandemic. During March, when the pandemic first broke, weekly game downloads rose 35% to 1.2billion.

While video games also saw a surge, it couldn’t be further behind. Across the board, mobile games were thriving. From the likes of puzzles, to online bingo and casino, games were being enjoyed by the millions.

In the case of the latter two, that was in part due to brick-and-mortar bingo halls and casinos being closed, but the sheer volume of people visiting online bingo sites (see here) has taken the industry to entire new levels, which are expected to be sustained for some time to come.

Enter the PS5

The PlayStation 5 from Sony, alongside the new Xbox being launched by Microsoft are expected to be the savior of console gaming, resurrecting it and placing it back at the forefront of the gaming mainstream.

There are expected to be some incredibly new features which will change gaming forever, and below you’ll find the features we believe will do that.

Making 4K the Norm

The PS5 is expected to make playing with 4K the normal, adding further quality to an already life-like gaming experience.

You will need much more internet bandwidth to get through games of this quality which is worth noting, as many players could begin to get frustrated by this.

AI Companionship

You’ve always been able to play against the computer, but one that reacts to your emotional state and offers its own? Well, that’s a different ball game.

The PS5 and gaming developers are going to integrate artificial intelligence into gaming more than ever before and allow players who are required more frequently to play alone, to do so with AI.

It’s also believed AI will be a key part of how we game too, with non-playing characters expected to be more intelligent than ever before, producing unique gaming experiences for each and every player.

Three Dimensional Audio

As well as significant graphics improvements, the PS5 will use 3D audio being branded as the Tempest Engine.

It’s set to add even more depth to the playing experience and be more immersive than ever before.

This is set to be a landmark moment for blind gamers, with the sounds within them able to give blind gamers a better picture of the game and therefore more chance of navigating through levels.

Exclusive Games & A Netflix-like Catalogue

Many brands are now wanting to become the Netflix of gaming and it could be Sony who takes the crown. The brand are launching bigger franchises than ever in the likes of God of War, The Last of Us and Uncharted, and that’s only going to advance with the introduction of a new console.

It’s unsure as to what will be launched just yet, but we can expect plenty more strong storytelling from the brand, which blows the likes of puzzle games and mobile-friendly titles out of the water.

Source: https://cybersguards.com/how-the-ps5-will-completely-change-gaming-as-we-know-it/

Continue Reading

Cyber Security

Compromised Credentials used by Hackers to Access the Content Management System

Avatar

Published

on

Hacker

Security analysts suspect that hackers used stolen passwords to access the content management system behind the website of Donald Trump’s campaign.

Hackers managed to hack into the website on Tuesday and modify the content on it. The message ‘This domain was confiscated’ was posted on donaldjtrump.com for a brief amount of time.

Trump campaign spokesman Tim Murtaugh, who also announced that law enforcement had been called on to investigate, reported the attack. He also said no personal data had been compromised.

The hackers said they managed to compromise confidential details on President Trump in the message posted on the website. They also provided two wallet IDs for cryptocurrencies, stating that if visitors sent money to them, they will release the details.

A Pretty Decent Privacy (PGP) public key was also included in the letter, which can be used to validate possible communications allegedly coming from hackers.

trump-site-hacked

The hackers most likely used stolen login codes, allegedly targeting the underlying Expression Engine content management system ( CMS), which is an alternative to WordPress, according to WordPress protection solutions provider Defiant, which produces the Wordfence product.

Although the content of the site was immediately restored, hours after the event was fixed, the “Privacy Policies” and “Terms & Conditions” sections also provided a “404 page not found” bug.

This suggests that the content management system itself, rather than the Cloudflare setup, has changed something. We also assume that the CMS being hacked is therefore more likely to be compromised than Cloudflare, Defiant says.

The platform uses Cloudflare as a content delivery network ( CDN), and Defiant insists that this could only have been used as an entry point if the perpetrators understood the secret IP of the domain hosting the platform. Thus, it is less plausible that this attack vector was used.

If the perpetrators had access to the Cloudflare account of the initiative and were able to direct the domain to their own IP address, merely pointing it to the correct IP address would have restored the entire website.

The concerns with the “Privacy Policy” and the “Terms & Conditions” pages, however, indicate that this was not the vector of attack.

The use of stolen passwords to enter the account where the donaldjtrump.com domain was registered would be much less likely; potential enter through FTP or SSH (would require not only FTP or SSH passwords, but also knowledge of the IP address of the root of the site); or the use of a zero-day Expression Engine bug, which has little known vulnerabilities, Defiant says.

About any possible situation entails the use of reused passwords to obtain access to the website donaldjtrump.com. Having 2-Factor Authentication allowed in virtually any case would have stopped such a situation from happening. It is also a reminder that it is critical not only to allow 2-Factor Authentication on the administrative panel of your website, but on any service it provides, even services that you might not think of as insecure, concludes Defiant.

The attack comes shortly after a Dutch security researcher reported that by guessing his password, which he said was “maga2020!” he acquired access to Donald Trump’s Twitter account. ”. The arguments have been refuted by the White House and Twitter and the researcher has yet to provide any definitive proof.

Source: https://cybersguards.com/compromised-credentials-used-by-hackers-to-access-the-content-management-system/

Continue Reading
AR/VR6 hours ago

AMD Announces Radeon RX 6000-series GPUs with USB-C “for a modern VR experience”

AI8 hours ago

Resiliency And Security: Future-Proofing Our AI Future

AI8 hours ago

AI Projects Progressing Across Federal Government Agencies

Blockchain10 hours ago

Kucoin and Revain Announce Partnership

AR/VR11 hours ago

Crowdfunded AR Startup Tilt Five Secures $7.5M Series A Investment

AR/VR11 hours ago

Crowdfunded AR Startup Tilt Five Secures $7.5M Series A Investment

Cyber Security16 hours ago

How the PS5 Will Completely Change Gaming As We Know It?

Cyber Security16 hours ago

Compromised Credentials used by Hackers to Access the Content Management System

Cyber Security16 hours ago

Which are the safest payment methods for online betting?

Cyber Security16 hours ago

How to stay safe if you’re using an Android device for betting?

Quantum18 hours ago

Bell nonlocality with a single shot

Quantum19 hours ago

Optimization of the surface code design for Majorana-based qubits

Quantum19 hours ago

Classical Simulations of Quantum Field Theory in Curved Spacetime I: Fermionic Hawking-Hartle Vacua from a Staggered Lattice Scheme

Ecommerce21 hours ago

How Digital Transformation Will Change the Retail Industry

Cyber Security1 day ago

Cyber Security Prognostication Conversation

AR/VR1 day ago

Win a Huge The Walking Dead Onslaught Merch Bundle Including the Game

AR/VR1 day ago

Hold Your Nerve With These Scary VR Horror Titles

Blockchain News1 day ago

Ethereum City Builder MCP3D Goes DeFi with $MEGA Token October 28

Blockchain News2 days ago

Why Bitcoin’s Price Is Rising Despite Selling Pressure from Crypto Whales

AI2 days ago

5 Work From Home Office Essentials

AR/VR2 days ago

AR For Remote Assistance: A True Game Changer

Blockchain News2 days ago

Smart Contract 101: MetaMask

AR/VR2 days ago

Yupitergrad Adding PlayStation VR & Oculus Quest Support Jan 2021

Blockchain News2 days ago

New Darknet Markets Launch Despite Exit Scams as Demand Rises for Illicit Goods

Blockchain News2 days ago

Bitcoin Millionaires at an All-Time High as Analysts Warn of a Pullback Before BTC Moves Higher

Fintech2 days ago

The Impact of BPM On the Banking And Finance Sector

AR/VR2 days ago

Samsung & Stanford University are Developing a 10,000 PPI OLED Display

Energy2 days ago

New Found Intercepts 22.3 g/t Au over 41.35m and 31.2 g/t Au over 18.85m in Initial Step-Out Drilling at Keats Zone, Queensway Project, Newfoundland

Energy2 days ago

Kennebec County Community Solar Garden Reaches Project Milestone

Energy2 days ago

Kalaguard® SB Sodium Benzoate Registered Under EPA FIFRA

Energy2 days ago

LF Energy Launches openLEADR to Streamline Integration of Green Energy for Demand Side Management

Energy2 days ago

Thermal Barrier Coatings Market To Reach USD 25.82 Billion By 2027 | CAGR of 4.9%: Reports And Data

Blockchain News2 days ago

$1 Billion in Bitcoin Moved, Making It the Largest Dollar Value Crypto Transaction in History

AR/VR2 days ago

Digital Catapult’s Augmentor Programme Reveals 10 new XR Startups

Singapore
Esports2 days ago

erkaSt joins NG

AR/VR2 days ago

Hands-on: Impressive PS5 DualSense Haptics & Tracking Tech Bodes Well for Future PSVR Controllers

Blockchain News2 days ago

Alibaba Founder Jack Ma Criticizes Current Financial Regulations

EdTech2 days ago

Google Classroom Comments: All You Need to Know! – SULS086

Blockchain News2 days ago

Bank for International Settlements to Issue a PoC CBDC With the Swiss Central Bank Before the End of 2020

Blockchain News2 days ago

Ripple CEO Disagrees with Coinbase CEO’s Apolitical Work Policy, Considers Relocating Overseas

Trending